Zhuo Lu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE/ACM Trans. Netw., December, 2024
Joint Trajectory Planning and Communication Design for Multiple UAVs in Intelligent Collaborative Air-Ground Communication Systems.
IEEE Internet Things J., October, 2024
Intelligently Joint Task Assignment and Trajectory Planning for UAV Cluster With Limited Communication.
IEEE Trans. Veh. Technol., September, 2024
Bandwidth Allocation for Federated Learning With Wireless Providers and Cost Constraints.
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Mob. Comput., May, 2024
FedLGA: Toward System-Heterogeneity of Federated Learning via Local Gradient Approximation.
IEEE Trans. Cybern., January, 2024
Adaptive QoE-Aware SFC Orchestration in UAV Networks: A Deep Reinforcement Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
2023
IEEE Trans. Mob. Comput., November, 2023
DBH Estimation for Individual Tree: Two-Dimensional Images or Three-Dimensional Point Clouds?
Remote. Sens., August, 2023
Steel Surface Defect Detection via Deformable Convolution and Background Suppression.
IEEE Trans. Instrum. Meas., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Approach for Monitoring Spatiotemporal Changes in Fractional Vegetation Cover Through Unmanned Aerial System-Guided-Satellite Survey: A Case Study in Mining Area.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023
Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Mob. Comput., 2022
An Improved LAI Estimation Method Incorporating with Growth Characteristics of Field-Grown Wheat.
Remote. Sens., 2022
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022
DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Stragglers Are Not Disasters: A Hybrid Federated Learning Framework with Delayed Gradients.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the International Conference on Machine Learning, 2022
When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE/ACM Trans. Netw., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
EAI Endorsed Trans. Security Safety, 2021
FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation.
CoRR, 2021
Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients.
CoRR, 2021
Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Wirel. Commun., 2020
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions.
CoRR, 2020
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation.
IEEE Trans. Mob. Comput., 2019
EAI Endorsed Trans. Security Safety, 2019
Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation.
Comput. Networks, 2019
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019
Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid.
IEEE Syst. J., 2018
In Vitro and In Vivo Experimental Studies of A Novel MR-Guided Method for Bipolar Radiofrequency Liver Ablation.
IEEE Access, 2018
Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Mob. Comput., 2017
J. Electr. Comput. Eng., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
How they interact? Understanding cyber and physical interactions against fault propagation in smart grid.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
IEEE Trans. Mob. Comput., 2016
Risk assessment based access control with text and behavior analysis for document management.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Friendships in the air: Integrating social links into wireless network modeling, routing, and analysis.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Defending active learning against adversarial inputs in automated document classification.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015
On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures.
IEEE Trans. Wirel. Commun., 2015
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014
Socio-technological Testbed for Evaluation of Combined Social and Communication Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011
2010
Wirel. Pers. Commun., 2010
Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error.
Circuits Syst. Signal Process., 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
2008
Joint Frequency Offset and Channel Estimation for MIMO Systems Based on Particle Swarm Optimization.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
IEEE Trans. Consumer Electron., 2007
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006